How Attackers Can Use KMS to Ransomware S3 Buckets - Bleon Proko
18:51
OSINT in Cyber Security & Intelligence Communities - Korab Keqekolla
21:56
Giorgio Ebbeling & Markus Nutz: From Data to Decisions—B2B Marketing Strategies at METRO Markets
1:05:25
Misconceptions of physical security - Brian Harris
52:58
Command-Line Obfuscation: You can run, _and_ you can hide - Wietze Beukema
25:55
Digital Twin Adoption in an FM & building maintenance space - Matt Cunliffe
29:46
From Feeding to Learning: Uncovering Hidden Dangers in Smart Devices for Pets and Kids - Roland Sako
37:00
Malware, Cats and Cryptography - Zhassulan Zhussupov
50:53